true
Presidential Executive Order: “Collect and Preserve” Incident Data. Is this the Catalyst for Cybersecurity’s Black Box? President Biden’s Executive Order (EO) on Improving the Nation’s Cybersecurity defines a solid path forward for the Federal government and its ... Read More
Cybersecurity’s Moneyball Transformation What do baseball and cybersecurity have in common? Nothing, at first glance. But, take a deeper look and you can see the glaring similarities. That's ... Read More
Only the Paranoid Survive, Recast for Cybersecurity Andrew Grove's seminal business management book Only the Paranoid Survive offers a fitting title for the current state of cybersecurity and a roadmap ... Read More
Stories of Cyber Defense Collaboration: Trustworthy Accountability Group (TAG) Nicole Perloth’s new book, This is How They Tell Me the World Ends, details our past and troubling trajectory in cyberspace. It is a terrific and ... Read More
Cybersecurity Today: Alice in Wonderland Meets the Matrix & Total Recall Cybersecurity operators scramble daily with uncertainty, seeking to determine if their feet are on the ground or standing on a false floor that gives ... Read More
Intelligence Sharing in the Time of COVID-19 Over the past few months, the world of information sharing has started to come together with security integration and automation. First, the ... Read More
COVID-19: Early Lessons for Cybersecurity Operators News broke the other day that there were at least two cases of COVID-19 in Santa Clara County, California as early as February 6, well before the ... Read More
Intelligence Management and Gartner's SOAR: Thinking About Workflow First Gartner's Security Orchestration Automation and Response (SOAR) market category was announced in November 2017, and since then we've seen numerous ... Read More
New Research from Cloud Security Alliance: Building a Foundation for Successful Cyber Threat Intelligence Exchange This week at the 2018 RSA Conference, the Cloud Security Alliance released a new framework for Building a Foundation for Successful Cyber Threat ... Read More
New E-Book: 5 Steps to Optimizing Your Threat Intelligence If you want to know how TruSTAR really feels about the state of threat intelligence today, look no further. Read More